Hi Valery,
>> Q1:
>>
>> The Security Considerations lists IKEv2/IPSec algorithms that are not
>> considered quantum-resistant. However, that is not mentioned anywhere
else. I
>> think it would be good to mention that in the Abstract and/or
Introduction.
>
> Introduction already contains the following text:
>
> If the preshared key has
> sufficient entropy and the PRF, encryption and authentication
> transforms are quantum-secure, then the resulting system is believed
> to be quantum resistant, that is, invulnerable to an attacker with a
> quantum computer.
>
> We think that it is out of scope of this document to classify existing
> algorithms on the ground of whether they are quantum secure or not,
> the Security Considerations section lists only most obvious cases.
I was thinking of just adding (to the text you referenced above) something like:
"The Security Considerations gives some examples of algorithms that are not
considered quantum-resistant."
But, if you don't think it is needed, I am fine with that. It was only a minor
issue, so :)
Regards,
Christer
_______________________________________________
IPsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ipsec